default search action
Arno Wacker
Person information
- affiliation: University of Kassel, Department of Electrical Engineering and Computer Science
- affiliation: University of Duisburg-Essen, Department of Computer Science and Applied Cognitive Science
- affiliation: University of Stuttgart, Institute for Parallel and Distributed Systems
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Mathias Schlolaut, Olga Kieselmann, Arno Wacker:
Comparing Nudges and Deceptive Patterns at a Technical Level. DDPCHI@CHI 2024 - 2023
- [c39]Henner Heck, Arno Wacker:
Disjoint Lookups in Kademlia for Random IDs. ACSOS-C 2023: 47-52 - [c38]Arno Wacker:
Preface. HistoCrypt 2023 - 2021
- [c37]Henner Heck, Arno Wacker:
Applying Harary Graph Structures to the Overlay Network Kademlia. ICCCN 2021: 1-8 - 2020
- [j20]Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl:
Decryption of historical manuscripts: the DECRYPT project. Cryptologia 44(6): 545-559 (2020)
2010 – 2019
- 2019
- [j19]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of Enigma double indicators with hill climbing. Cryptologia 43(4): 267-292 (2019) - [c36]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann, Arno Wacker:
Informatik mit Recht. GI-Jahrestagung 2019: 293-294 - 2018
- [j18]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts. Cryptologia 42(6): 485-513 (2018) - [j17]Olga Kieselmann, Arno Wacker:
Löschen im Internet - rechtlich gefordert und technisch möglich! Datenschutz und Datensicherheit 42(7): 437-441 (2018) - [c35]Henner Heck, Olga Kieselmann, Nils Kopal, Arno Wacker:
A Decentralized Resilient Short-Term Cache for Messaging. DAIS 2018: 110-121 - 2017
- [j16]George Lasry, Ingo Niebel, Nils Kopal, Arno Wacker:
Deciphering ADFGVX messages from the Eastern Front of World War I. Cryptologia 41(2): 101-136 (2017) - [c34]Olga Kieselmann, Arno Wacker, Gregor Schiele:
k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. ARES 2017: 43:1-43:10 - [c33]Henner Heck, Olga Kieselmann, Arno Wacker:
Evaluating Connection Resilience for the Overlay Network Kademlia. ICDCS 2017: 2581-2584 - [i3]Henner Heck, Olga Kieselmann, Arno Wacker:
Evaluating Connection Resilience for the Overlay Network Kademlia. CoRR abs/1703.09171 (2017) - 2016
- [j15]George Lasry, Nils Kopal, Arno Wacker:
Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Cryptologia 40(1): 49-69 (2016) - [j14]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. Cryptologia 40(2): 141-176 (2016) - [j13]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of columnar transposition cipher with long keys. Cryptologia 40(4): 374-398 (2016) - [j12]George Lasry, Moshe Rubin, Nils Kopal, Arno Wacker:
Cryptanalysis of Chaocipher and solution of Exhibit 6. Cryptologia 40(6): 487-514 (2016) - [j11]Lars Wittmaack, Bernhard Esslinger, Ludger Schmidt, Benjamin Strenge, Arno Wacker:
Vertrauensvolle E-Mail-Kommunikation. Datenschutz und Datensicherheit 40(5): 271-277 (2016) - [j10]Bernhard Esslinger, Ludger Schmidt, Benjamin Strenge, Arno Wacker:
Unpopuläre E-Mail-Verschlüsselung - Auflösung des Henne-Ei-Problems. Datenschutz und Datensicherheit 40(5): 283-289 (2016) - [c32]Henner Heck, Stefan Rudolph, Christian Gruhl, Arno Wacker, Jörg Hähner, Bernhard Sick, Sven Tomforde:
Towards Autonomous Self-Tests at Runtime. FAS*W@SASO/ICCAC 2016: 98-99 - [c31]Henner Heck, Olga Kieselmann, Arno Wacker:
Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems. SASO 2016: 140-141 - [i2]Henner Heck, Olga Kieselmann, Arno Wacker:
Evaluating Connection Resilience for Self-Organized Distributed Cyber-Physical Systems. CoRR abs/1605.08002 (2016) - [i1]Olga Kieselmann, Arno Wacker:
k-rAC - a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. CoRR abs/1609.09329 (2016) - 2015
- [j9]Olga Kieselmann, Nils Kopal, Arno Wacker:
"Löschen" im Internet. Datenschutz und Datensicherheit 39(1): 31-36 (2015) - [c30]Francesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker:
A novel method for securing critical infrastructures by detecting hidden flows of data. CNS 2015: 648-654 - [c29]Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker:
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel. CNS 2015: 667-674 - [c28]Olga Kieselmann, Nils Kopal, Arno Wacker:
A Novel Approach to Data Revocation on the Internet. DPM/QASA@ESORICS 2015: 134-149 - [c27]Nils Kopal, Olga Kieselmann, Arno Wacker:
Simulating Cheated Results Dissemination for Volunteer Computing. FiCloud 2015: 742-747 - [c26]Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker:
SoftGap: A Multi Independent Levels of Security Cross-Domain Solution. FiCloud 2015: 754-759 - [c25]Christian Gruhl, Bernhard Sick, Arno Wacker, Sven Tomforde, Jörg Hähner:
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection. iCAST 2015: 194-200 - 2014
- [j8]George Lasry, Nils Kopal, Arno Wacker:
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach. Cryptologia 38(3): 197-214 (2014) - [j7]Nils Kopal, Olga Kieselmann, Arno Wacker, Bernhard Esslinger:
CrypTool 2.0. Datenschutz und Datensicherheit 38(10): 701-708 (2014) - [j6]Klaus David, Gisela Bieling, Doreen Böhnstedt, Silke Jandt, Sandra Ohly, Alexander Roßnagel, Antje Schmitt, Ralf Steinmetz, Ruth Stock-Homburg, Arno Wacker:
Balancing the Online Life: Mobile Usage Scenarios and Strategies for a New Communication Paradigm. IEEE Veh. Technol. Mag. 9(3): 72-79 (2014) - [c24]Sven Tomforde, Jörg Hähner, Hella Seebach, Wolfgang Reif, Bernhard Sick, Arno Wacker, Ingo Scholtes:
Engineering and Mastering Interwoven Systems. ARCS Workshops 2014: 1-8 - [p4]Matthias Söllner, Axel Hoffmann, Holger Hoffmann, Arno Wacker, Jan Marco Leimeister:
Understanding the Formation of Trust. Socio-technical Design of Ubiquitous Computing Systems 2014: 39-58 - [p3]Olga Kieselmann, Nils Kopal, Arno Wacker:
Ranking Cryptographic Algorithms. Socio-technical Design of Ubiquitous Computing Systems 2014: 151-171 - [p2]Arno Wacker, Jan Marco Leimeister, Holger Hoffmann:
The Future of Socio-Technical Design for Ubiquitous Computing Systems. Socio-technical Design of Ubiquitous Computing Systems 2014: 341-353 - [e1]Klaus David, Kurt Geihs, Jan Marco Leimeister, Alexander Roßnagel, Ludger Schmidt, Gerd Stumme, Arno Wacker:
Socio-technical Design of Ubiquitous Computing Systems. Springer 2014, ISBN 978-3-319-05043-0 [contents] - 2013
- [j5]Silke Jandt, Olga Kieselmann, Arno Wacker:
Recht auf Vergessen im Internet. Datenschutz und Datensicherheit 37(4): 235-241 (2013) - [c23]Jörg Hähner, Stefan Rudolph, Sven Tomforde, Dominik Fisch, Bernhard Sick, Nils Kopal, Arno Wacker:
A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques. ARCS Workshops 2013 - [c22]Christian Voigtmann, Christoph Schutte, Arno Wacker, Klaus David:
A new approach for distributed and collaborative context prediction. PerCom Workshops 2013: 20-24 - 2012
- [c21]Matthäus Wander, Sebastian Holzapfel, Arno Wacker, Torben Weis:
NTALG - TCP NAT traversal with application-level gateways. CCNC 2012: 46-47 - [c20]Sebastian Holzapfel, Arno Wacker, Torben Weis, Matthäus Wander:
An architecture for complex P2P systems. CCNC 2012: 507-511 - [c19]Shervin Shirmohammadi, Shun-Yun Hu, Wei Tsang Ooi, Gregor Schiele, Arno Wacker:
Mixing virtual and physical participation: The future of conference attendance? HAVE 2012: 150-155 - [c18]Matthias Söllner, Axel Hoffmann, Holger Hoffmann, Arno Wacker, Jan Marco Leimeister:
Understanding the Formation of Trust in IT Artifacts. ICIS 2012 - [c17]Christopher Boelmann, Torben Weis, Michael Engel, Arno Wacker:
Self-Stabilizing Micro Controller for Large-Scale Sensor Networks in Spite of Program Counter Corruptions Due to Soft Errors. ICPADS 2012: 506-513 - 2011
- [j4]Torben Weis, Arno Wacker:
Federating Websites with the Google Wave Protocol. IEEE Internet Comput. 15(3): 51-58 (2011) - [c16]Torben Weis, Arno Wacker:
Self-stabilizing embedded systems. OC@ICAC 2011: 59-66 - [c15]Matthäus Wander, Torben Weis, Arno Wacker:
Detecting Opportunistic Cheaters in Volunteer Computing. ICCCN 2011: 1-6 - [c14]Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Lorenz Schwittmann, Torben Weis:
A New Protocol to Determine the NAT Characteristics of a Host. IPDPS Workshops 2011: 1651-1658 - [c13]Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis:
SYNI - TCP Hole Punching Based on SYN Injection. NCA 2011: 241-246 - [p1]Helge Parzyjegla, Arnd Schröter, Enrico Seib, Sebastian Holzapfel, Matthäus Wander, Jan Richling, Arno Wacker, Hans-Ulrich Heiß, Gero Mühl, Torben Weis:
Model-Driven Development of Self-organising Control Applications. Organic Computing 2011: 131-144 - 2010
- [c12]Matthäus Wander, Arno Wacker, Torben Weis:
Towards peer-to-peer-based cryptanalysis. LCN 2010: 1005-1012
2000 – 2009
- 2009
- [j3]Sebastian Schuster, Arno Wacker, Torben Weis:
Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 17 (2009) - [j2]Torben Weis, Arno Wacker, Sebastian Schuster, Sebastian Holzapfel:
Towards Logical Clocks in P2P-based MMVEs. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 17 (2009) - [c11]Martin Saternus, Torben Weis, Sebastian Holzapfel, Arno Wacker:
Gears4Net. ICPP Workshops 2009: 113-120 - [c10]Mirko Knoll, Matthias Helling, Arno Wacker, Sebastian Holzapfel, Torben Weis:
Bootstrapping Peer-to-Peer Systems Using IRC. WETICE 2009: 122-127 - 2008
- [b1]Arno Rüdiger Wacker:
Key distribution schemes for resource constrained devices in wireless sensor networks. University of Stuttgart, 2008 - [j1]Arno Wacker, Gregor Schiele, Sebastian Schuster, Torben Weis:
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments. Int. J. Adv. Media Commun. 2(4): 364-379 (2008) - [c9]Matthias Gauger, Daniel Minder, Pedro José Marrón, Arno Wacker, Andreas Jürgen Lachenmann:
Prototyping sensor-actuator networks for home automation. REALWSN@EuroSys 2008: 56-60 - [c8]Mirko Knoll, Arno Wacker, Gregor Schiele, Torben Weis:
Bootstrapping in Peer-to-Peer Systems. ICPADS 2008: 271-278 - [c7]Torben Weis, Arno Wacker:
Self-stabilizing Automata. BICC 2008: 59-69 - [c6]Arno Wacker, Gregor Schiele, Sebastian Holzapfel, Torben Weis:
A NAT Traversal Mechanism for Peer-To-Peer Networks. Peer-to-Peer Computing 2008: 81-83 - 2007
- [c5]Gregor Schiele, Richard Süselbeck, Arno Wacker, Jörg Hähner, Christian Becker, Torben Weis:
Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming. CCGRID 2007: 773-782 - [c4]Mirko Knoll, Arno Wacker, Gregor Schiele, Torben Weis:
Decentralized Bootstrapping in Pervasive Applications. PerCom Workshops 2007: 589-592 - 2005
- [c3]Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rothermel:
A new approach for establishing pairwise keys for securing wireless sensor networks. SenSys 2005: 27-38 - 2004
- [c2]Arno Wacker, Timo Heiber, Holger Cermann:
A key-distribution scheme for wireless home automation networks. CCNC 2004: 47-52 - [c1]Arno Wacker, Timo Heiber, Holger Cermann, Pedro José Marrón:
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks. Pervasive 2004: 194-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 16:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint